Dissertations / Theses on the topic 'Bug'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Bug.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Adhikarla, Sridhar. "Automated Bug Classification. : Bug Report Routing." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-166224.
Full textCordell, Susan, and TP Baxter. "The Conenose Bug (AKA "The Kissing Bug")." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 1999. http://hdl.handle.net/10150/144783.
Full textOne would not suspect that an insect with the congenial nickname of kissing bug could cause life-threatening allergic reactions (anaphylaxis) in sensitive individuals. But anaphylactic shock can be the result of the bite of Triatoma species, also known as the conenose bug, kissing bug, assassin bug, Mexican bedbug, and the Wallapai tiger. This publication discusses the identification, habitat, and the conenose bite of this insect, as well as the controlling method used to reduce theie numbers.
Connelly, Rita. "Whiteflies-the Tiny Bug with the Big Bite." College of Agriculture, University of Arizona (Tucson, AZ), 1992. http://hdl.handle.net/10150/295733.
Full textAustli, Viktor, and Elin Hernborg. "Standardization of Bug Validation." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-34801.
Full textChen, Jau-Yuan. "Mobile Energy Bug Diagnosis." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1366382081.
Full textSvahn, Caroline. "Automated Bug Report Routing." Thesis, Linköpings universitet, Statistik och maskininlärning, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-139037.
Full textGouge, Dawn, and Carl Olson. "Choosing a Bug Repellent." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2011. http://hdl.handle.net/10150/146730.
Full text"Bugs @ Home series Formerly titled: Insect Repellents; Originally published: 2003"
This publication describes how to use insect repellents safely and effectively. It offers comparisons between repellents available to the public and gives advice on which products are suitable for children.
Auwal, Bilyaminu Romo. "Improving the quality of bug data in software repositories." Thesis, Brunel University, 2016. http://bura.brunel.ac.uk/handle/2438/13655.
Full textKingdon, Lorraine B. "The Bug of the Year." College of Agriculture, University of Arizona (Tucson, AZ), 1993. http://hdl.handle.net/10150/295734.
Full textAnvik, John. "Assisting bug report triage through recommendation." Thesis, University of British Columbia, 2007. http://hdl.handle.net/2429/265.
Full textGordon, Jennifer R. "Insecticide Resistance in the Bed Bug." UKnowledge, 2014. http://uknowledge.uky.edu/entomology_etds/14.
Full textZhang, Yiwei, and 张益维. "SIGBOT: signature-based multiple-bug localization." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B43757418.
Full textAraújo, Cristiano Werner. "Bug prediction in procedural software systems." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2017. http://hdl.handle.net/10183/170023.
Full textInformation regarding bug fixes has been explored to build bug predictors, which provide support for the verification of software systems, by identifying fault-prone elements, such as files. A wide range of static and change metrics have been used as features to build such predictors. Many bug predictors have been proposed, and their main target is objectoriented systems. Although object-orientation is currently the choice for most of the software applications, the procedural paradigm is still being used in many—sometimes crucial—applications, such as operating systems and embedded systems. Consequently, they also deserve attention. This dissertation extends work on bug prediction by evaluating and tailoring bug predictors to procedural software systems. We provide three key contributions: (i) comparison of bug prediction approaches in context of procedural software systems, (ii) proposal of the use of software quality features as prediction features in the studied context, and (iii) evaluation of the proposed features in association with the best approach found in (i). Our work thus provides foundations for improving the bug prediction performance in the context of procedural software systems.
Vatandoust, Arman. "Machine Learning for Software Bug Categorization." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-395253.
Full textGrangier, Emmanuelle. "Le bug : une esthétique de l'accident." Paris 1, 2006. http://www.theses.fr/2006PA010575.
Full textZhang, Yiwei. "SIGBOT signature-based multiple-bug localization /." Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B43757418.
Full textGouge, Dawn. "How to Bug Proof your Home." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2009. http://hdl.handle.net/10150/146731.
Full textMoran, Kevin Patrick. "Enhancing Bug Reports for Mobile Apps." W&M ScholarWorks, 2015. https://scholarworks.wm.edu/etd/1539626966.
Full textCavalcanti, Yguaratã Cerqueira. "A bug report analysis and search tool." Universidade Federal de Pernambuco, 2009. https://repositorio.ufpe.br/handle/123456789/2027.
Full textManutenção e evolução de software são atividades caracterizadas pelo seu enorme custo e baixa velocidade de execução. Não obstante, elas são atividades inevitáveis para garantir a qualidade do software quase todo software bem sucedido estimula os usuários a fazer pedidos de mudanças e melhorias. Sommerville é ainda mais enfático e diz que mudanças em projetos de software são um fato. Além disso, diferentes estudos têm afirmado ao longo dos anos que as atividades de manutenção e evolução de software são as mais caras do ciclo de desenvolvimento, sendo responsável por cerca de até 90% dos custos. Todas essas peculiaridades da fase de manutenção e evolução de software leva o mundo acadêmico e industrial a investigar constantemente novas soluções para reduzir os custos dessas atividades. Neste contexto, Gerência de Configuração de Software (GCS) é um conjunto de atividades e normas para a gestão da evolução e manutenção de software; GCS define como são registradas e processadas todas as modificações, o impacto das mesmas em todo o sistema, dentre outros procedimentos. Para todas estas tarefas de GCM existem diferentes ferramentas de auxílio, tais como sistemas de controle de versão e bug trackers. No entanto, alguns problemas podem surgir devido ao uso das mesmas, como por exemplo o problema de atribuição automática de responsável por um bug report e o problema de duplicação de bug reports. Neste sentido, esta dissertação investiga o problema de duplicação de bug reports resultante da utilização de bug trackers em projetos de desenvolvimento de software. Tal problema é caracterizado pela submissão de dois ou mais bug reports que descrevem o mesmo problema referente a um software, tendo como principais conseqüências a sobrecarga de trabalho na busca e análise de bug reports, e o mal aproveitamento do tempo destinado a essa atividade
Kim, Sunghun. "Adaptive bug prediction by analyzing project history /." Diss., Digital Dissertations Database. Restricted to UC campuses, 2006. http://uclibs.org/PID/11984.
Full textHorn, Alex. "Automated concurrency bug finding using partial-orders." Thesis, University of Oxford, 2015. https://ora.ox.ac.uk/objects/uuid:a7c5aaee-2a40-4c22-aed8-3e12287bc315.
Full textTait, Calista (Calista Elizabeth) 1975. "A highly configurable software bug tracking system." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80130.
Full textIncludes bibliographical references (p. 61-62).
by Calista Tait.
S.B.and M.Eng.
Rahimi, Ali 1976. "Bug vision : experiments in low resolution vision." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/62362.
Full textIncludes bibliographical references (p. 71-73).
Tracking multiple people using cameras is similar to the well-studied problem of tracking multiple radar or sonar echoes. This thesis shows that current camera-based tracking algorithms convert each image in a video sequence to a list of targets through a segmentation step, and pass this target set to a traditional multiple-point-target tracking algorithm. Various tracking vision-based strategies as well as point tracking strategies are discussed. Bayesian solutions to the point-tracking problem are well understood, because the generative models need describe the dynamics of simple point objects. In addition, the radar tracking problem assumes that measurements are noise corrupted positions, which makes it easy to cast the tracking problem in a Bayesian framework. Unlike radar, cameras report observations as images. Though point object dynamics can still be used to describe the hidden state of targets, the observation model is an image formation process. As such, the typical solution to tracking in the camera-based tracking community is to reduce each image to a point set, where each point corresponds to a potential target. However, this step introduces uncertainty that is usually not modeled. This thesis proposes a Bayesian person-tracking algorithm which models the entire process of tracking, from the dynamics of the targets to the formation of easy to compute image transforms. An approximate Bayesian tracking algorithm based on Variational Bayes is developed. All the benefits of a Bayesian framework including modeling of the certainty of the recovered results and model selection are taken advantage of. The resulting person tracking algorithm can operate on extremely poor quality imagery. In addition, the tracker can compute the number of targets in the scene automatically as a side effect of its Bayesian formulation.
by Ali Rahimi.
S.M.
Bug, Hannah [Verfasser]. "Digitalisierung und Rundfunkkonzentrationskontrolle von Medienkonglomeraten / Hannah Bug." Frankfurt a.M. : Peter Lang GmbH, Internationaler Verlag der Wissenschaften, 2018. http://d-nb.info/1161044469/34.
Full textEriksson, Caroline, and Emilia Kallis. "NLP-Assisted Workflow Improving Bug Ticket Handling." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-301248.
Full textVid mjukvaruutveckling går mycket resurser åt till felsökning, en process där tidigare lösningar kan hjälpa till att lösa aktuella problem. Det är ofta tidskrävande att läsa felrapporterna som innehåller denna information. För att minimera tiden som läggs på felsökning och säkerställa att kunskap från tidigare lösningar bevaras inom företaget, utvärderades om sammanfattningar skulle kunna effektivisera detta. Abstrakta och extraherande sammanfattningsmodeller testades för uppgiften och en finjustering av bert-extractive- summarizer gjordes. De genererade sammanfattningarna jämfördes i avseende på upplevd kvalitet, genereringshastighet, likhet mellan varandra och sammanfattningslängd. Den genomsnittliga sammanfattningen innehöll delar av den viktigaste informationen och den föreslagna lösningen var antingen väldokumenterad eller besvarade inte problembeskrivningen alls. Den finjusterade BERT och den abstrakta modellen BART visade goda förutsättningar för att generera sammanfattningar innehållande all den viktigaste informationen.
Näslund, Johan, and Henrik Nero. "To Force a Bug : Extending Hybrid Fuzzing." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-19721.
Full textEn av de mer lovande lösningarna för automatiserad binärtestning är i dagsläget hybrid fuzzing, en kombination av två vedertagna tillvägagångssätt, fuzzing och symbolisk exekvering. Forskarna som utvecklade Angr och Driller anses ofta vara några av de första med att testa denna approach. Detta har i sin tur öppnat upp för fler mer specialiserade verktyg som QSYM. Dessa hybrid fuzzers mäter oftast sin framgång i hänsyn till hur mycket kod som nås under testningen. Detta är ett typiskt tillvägagångssätt, men som med många metoder är det inte felfri. Kod som har exekverats, utan att en bugg utlösts, är inte nödvändigtvis felfri. Vissa buggar beror på vilken kontext maskininstruktioner exekveras i -- ett exempel är double-free sårbarheter. Att minne har frigjorts flera gånger betyder inte ovillkorligen att en double-free sårbarhet har uppstått. För att en sådan sårbarhet ska uppstå måste samma minne frigöras flera gånger (utan att detta minne omallokerats mellan anropen till free). I detta projekt breddar vi en av de främsta hybrid fuzzers, QSYM, ett projekt med öppen källkod. Det vi tillför är detektering av double-free i ett verktyg vi kallar QSIMP. Vi undersöker sedan vår hypotes, som säger att det är möjligt att implementera sådan funktionalitet utan att förlora så mycket prestanda att det gör verktyget opraktiskt. För att bepröva hypotesen har vi designat två experiment. Ett experiment testar verktygets förmåga att detektera double-free sårbarheter (den sortens kontext-känsliga sårbarheter vi har valt att fokusera på). I det andra experimentet utforskar vi huruvida verktyget är skalbart då den nya funktionaliteten körs. Våra experiment visar att vi har möjliggjort detektering av kontext-känsliga buggar genom vidareutveckling av verktyget QSYM. QSIMP hittar double-free buggar, dock inte alla, på grund av optimiseringar som vi ej har lyckats arbeta runt. Detta har gjorts utan större effekter på skalbarheten av verktyget enligt resultaten från våra experiment. Vårt verktyg hittar samma buggar som orignal verktyget QSYM, samtidigt som vi tillägger funktionalitet för att hitta double-free sårbarheter.
Wei, Pihui. "Dynamic Bug Detection in TinyOS Operating Environments." The Ohio State University, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=osu1238166929.
Full textRehnholm, Gustav, and Felix Rysjö. "Bug Prediction with Machine Learning : Bloodhound 0.1." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-84333.
Full textDilshener, Tezcan. "Improving information retrieval bug localisation using contextual heuristics." Thesis, Open University, 2017. http://oro.open.ac.uk/50204/.
Full textNaciri, William Malik. "Bug Finding Methods for Multithreaded Student Programming Projects." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/78675.
Full textMaster of Science
Harrison, Scott Atlee. "Reproductive Behavior in the Bed Bug (Cimex lectularius)." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1452251747.
Full textBealmear, Stacey, Peter Warren, and Kelly Young. "Bagrada Bug: A New Pest for Arizona Gardeners." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2012. http://hdl.handle.net/10150/263172.
Full textArtchounin, Daniel. "Tuning of machine learning algorithms for automatic bug assignment." Thesis, Linköpings universitet, Programvara och system, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-139230.
Full textMcEwan, Peter Kwaku. "Flight capacity of triatomine bug vectors of Chagas disease." Thesis, Bangor University, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.304798.
Full textPolitt, Holger. "Hinter dem Bug : zur polnischen Sicht auf die Ukrainekrise." Universität Potsdam, 2014. http://opus.kobv.de/ubp/volltexte/2014/7182/.
Full textNewcombe, Devi Isadora Ramayanti. "Maternal effects in the large milkweed bug Oncopeltus fasciatus." Thesis, University of Exeter, 2013. http://hdl.handle.net/10871/11343.
Full textBarber, Kristin M. "Improving Bug Visibility using System-Level Assertions and Transactions." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1377875020.
Full textNabil, Mohamed. "Le bug de l'an 2000 : aspects économiques et juridiques." Perpignan, 1999. http://www.theses.fr/1999PERP0349.
Full textTaylor, Christopher Michael. "Understanding the relationship between the brown marmorated stink bug, Halyomorpha halys (Stal), and its symbiont, Pantoea carbekii, with implications for stink bug management." Thesis, University of Maryland, College Park, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10128715.
Full textSymbiotic relationships between insects and beneficial microbes are very common in nature, especially within the Hemiptera. The brown marmorated stink bug, Halyomorpha halys Stål, harbors a symbiont, Pantoea carbekii, within the fourth region of the midgut in specialized crypts. In this dissertation, I explored this insect-microbe relationship. I determined that the brown marmorated stink bug is heavily reliant on its symbiont, and that experimental removal of the symbiont from the egg mass surface prior to nymphal acquisition led to lower survival, longer development, lower fecundity, and aberrant nymphal behavior. Additionally, I determined that even when the symbiont is acquired and housed in the midgut crypts, it is susceptible to stressors. Stink bugs reared at a higher temperature showed lower survival, longer development, and a cease in egg mass production, and when bugs were screened for their symbiont, fewer had successfully retained it while under heat stress. Finally, with the knowledge that the stink bug suffers decreases in fitness when its symbiont is missing or stressed, I wanted to determine if targeting the symbiont was a possible management technique for the stink bug. I tested the efficacy of a number of different insecticidal and antimicrobial products to determine whether prevention of symbiont acquisition from the egg mass was possible, and results indicated that transmission of the symbiont from the egg mass to the newly hatched nymph was negatively impacted when certain products were applied (namely surfactants or products containing surfactants). Additionally, direct effects on hatch rate and survival were reported for certain products, namely the insect growth regulator azadirachtin, which suggests that nymphs can pick up residues from the egg mass surface while probing for the symbiont. I conclude that P. carbekii plays a critically important role in the survival of its host, the brown marmorated stink bug, and its presence on the egg mass surface before nymphal hatch makes it targetable as a potential management technique.
Erezyilmaz, Deniz F. "The genetic and endocrine bases of the evolution of complete metamorphosis in insects /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/5165.
Full textBlinka, Eric Lee. "BIOLOGICAL AND ECOLOGICAL STUDIES ON GREEN STINK BUG, Acrosternum hilare, AND BROWN STINK BUG, Euschistus servus (HEMIPTERA: PENTATOMIDAE), IN EASTERN NORTH CAROLINA CROPPING SYSTEMS." NCSU, 2008. http://www.lib.ncsu.edu/theses/available/etd-04282008-114706/.
Full textWenstad, Peder. "GPS Guided R/C Car : The Local Bug Test Platform." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for teknisk kybernetikk, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-11121.
Full textSchulz, Pascal. "Penetration Testing of Web Applications in a Bug Bounty Program." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-32404.
Full textBug, Steffen [Verfasser]. "Charakterisierung von Mobilfunkkanälen auf Basis der nichtlinearen Dynamik / Steffen Bug." Aachen : Shaker, 2006. http://d-nb.info/1186583835/34.
Full textGao, Qi. "Runtime Support for Improving Reliability in System Software." The Ohio State University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=osu1267818711.
Full textStutt, Alastair David. "Reproductive strategies and sexual conflict in the bed bug Cimex lectularius." Thesis, University of Sheffield, 1999. http://etheses.whiterose.ac.uk/6027/.
Full textFERREIRA, ISABELLA VIEIRA. "ASSESSING THE BUG-PRONENESS OF REFACTORED CODE: LONGITUDINAL MULTI-PROJECT STUDIES." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2018. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=35428@1.
Full textCONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO
Os elementos de código geralmente mudam ao longo da evolução do sistema, o que implica em uma eventual degradação estrutural do código fonte. Sintomas recorrentes de tal degradação são chamados anomalias de código. Estudos sugerem que quanto mais anomalias de código afetam um sistema, mais alta se torna a propensão a bugs dos elementos de código. Para lidar com tal degradação da qualidade estrutural do código, desenvolvedores geralmente aplicam refatorações no código fonte. No entanto, aplicar refatorações pode não ser suficiente para reduzir a propensão a bugs dos elementos de código degradados. Um estudo recente sugere que refatorações induzem bugs frequentemente. No entanto, os autores não analisam se o código refatorado está, de fato, diretamente relacionado à introdução de bugs. Com isso, nesta dissertação, realizamos dois estudos longitudinais de múltiplos projetos para avaliar a propensão a bugs do código refatorado. Nossa metodologia teve como objetivo abordar várias limitações de estudos anteriores. Por exemplo, definimos duas propriedades complementares da propensão a bugs do código refatorado, sendo elas, frequência e distância. Enquanto a primeira propriedade quantifica a frequência com que um código refatorado está relacionado a bugs que emergiram no código fonte, a distância quantifica o quão próximo um bug surge depois que uma refatoração é aplicada. Nosso primeiro estudo tem como objetivo avaliar a propensão a bugs de refatorações isoladas. Primeiro, nossos resultados mostram que 80 porcento dos elementos degradados que se tornaram bugs não foram previamente refatorados. Este resultado implica que um código refatorado é menos propenso a bugs do que um código não refatorado. Em segundo lugar, em 75 porcento das vezes um bug surge depois de 7 mudanças feitas a partir da operação de refatoração, o que geralmente corresponde à 3 meses nos projetos analisados. Nosso segundo estudo tem como objetivo avaliar a propensão a bugs de refatorações em lote, ou seja, refatorações aplicadas em sequência. Nossos resultados mostram que, na maioria dos casos, o código refatorado em lotes é mais resiliente à introdução de bugs do que o código refatorado por meio de refatorações isoladas.
Programs often change along the system evolution, which implies an eventual code structure degradation. Recurring symptoms of such degradation are code smells. Studies suggest that the more frequently code smells affect a system, the higher becomes the bug-proneness of the code elements. To tackle code structural quality degradation, developers often apply refactorings on smelly program elements. However, applying refactorings might not suffice to reduce the bug-proneness of such degraded program elements. Previous empirical studies do not systematically analyze the bug-proneness of refactored code. Even though a recent study suggests that refactoring induces bugs frequently, the authors do not analyze to what extent refactored code is indeed closely related to the bug occurrence. Thus, in this dissertation, we conducted two longitudinal multi-project studies to assess the bugproneness of refactored code. Our methodology aimed to address various limitations of previous studies. For instance, we have defined two complementary properties of the bug-proneness of refactored code, i.e., frequency and distance. While the former quantifies how often a refactored code is related to emerging bugs, the latter quantifies how close a bug emerges after a refactoring has been applied. The quantitative analysis of such properties was complemented by a manual analysis of refactorings closely related to the bug occurrence. Our first study aims at assessing the bug-proneness of code refactored through isolated refactorings, i.e., a single refactoring operation not performed in conjunction with other refactoring operations. This study reveals that 80 per cent of the smelly elements that became buggy were not previously refactored. This result suggests the refactored code is much less bug-prone than non-refactored code. Moreover, in 75 per cent of the times, a bug emerges in 7 changes far from the refactoring operation; this amount of changes usually corresponds to 3 months in the analyzed projects. Our second study aims at assessing the bug-proneness of code elements refactored through batch refactorings, i.e., a sequence of inter-related refactoring operations. Our results show that code refactored through batches is often more resilient to the introduction of bugs as compared to code refactored through isolated refactorings.
Tomasco, Ermenegildo. "Separating computation from communication : a design approach for concurrent bug finding." Thesis, University of Southampton, 2017. https://eprints.soton.ac.uk/418976/.
Full textVan, den Hooff Jelle (Jelle August). "Fast bug finding in lock-free data structures with CB-DPOR." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/92058.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 39-40).
This thesis describes CB-DPOR, an algorithm for quickly finding bugs in lock-free data structures. CB-DPOR is a combination of the CHESS and DPOR model checking algorithms. CB-DPOR performs similar to the concurrently developed preemption-bounded BPOR algorithm. CODEX is a tool for finding bugs in lock-free data structures. CODEX implements CBDPOR and this thesis demonstrates how to use CODEX to find bugs. This thesis describes new bugs in open-source lock-free data structures, and compares the performance of CBDPOR with the earlier model checking algorithms CHESS, DPOR, and PCT. CB-DPOR find bugs one to two orders of magnitude faster than earlier algorithms.
by Jelle van den Hooff.
M. Eng.
Andersson, Johan. "Bug Report: A Study of Semantic Change during the Digital Revolution." Thesis, Stockholms universitet, Engelska institutionen, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-189593.
Full text